Anomaly Exposure in Network Traffic and its collision: a Survey  

Abstract

Antagonistic network traffic is frequently "diverse” from kind traffic in ways that can be classified without knowing the way of the attack. Anomaly exposure is a significant problem that has been investigates within diverse research areas and application domains. Many anomaly exposure techniques have been specifically residential for certain application domains, while others are more generic. These survey papers provide a ordered and complete overview of the research on anomaly exposure. We have grouped existing techniques into different categories based on the underlying approach adopted by each technique. For each group we have recognized key assumptions, which are used by the method to distinguish between normal and anomalous behavior. For each category, we discuss a basic anomaly exposure technique, and then show how the different accessible techniques in that group are variants of the basic technique. Here our paper focus on anomaly exposure in network and its impact over the network and classify the different technique for detecting anomaly in network 

Authors and Affiliations

Saurabh Ratnaparkhi , Anup Bhange

Keywords

Related Articles

Ontology construction and query indexing technique to improve query indexing time, precision and number of good pages visited 

For The existing search engines have many issues. In this research we have considered the issue of query processing in hakia search engines. Current search is done on ranking based query processing means displaying r...

PERVASIVE AUTHENTICATION AND AUTHORIZATION INFRASTRUCTURES FOR MOBILE USERS USING PERVASIVE-PKI  

In computer science distributed systems could be more secured with a distributed trust model based on PKI. PKI provides a framework to verify the identities of each entities of given domain. Network and device heterogene...

Balanced window size Allocation Mechanism for Congestion control of Transmission Control Protocol based on improved bandwidth Estimation.

TCP is the widely used protocol for its reliable data communication over the network. Though it is used for enabling communication over the large network, it has some incapability in handling continues data transmission...

Simulated Annealing optimized PID Controller design using ISE, IAE, IATE and MSE error criteria

A PID controller is designed using ISE, IAE, ITAE and MSE error criteria for stable linear time invariant continuous system. A Simulated Annealing PID controller is designed for the plant to meet the desired performance...

A Survey on content Anatomy Approach to Temporal Topic Summarization  

content anatomy approach is an emerging research area in Content mining. In this approach, content anatomy approach defines a task called topic anatomy. Topic anatomy summarizes and associates the core parts of a top...

Download PDF file
  • EP ID EP104339
  • DOI -
  • Views 79
  • Downloads 0

How To Cite

Saurabh Ratnaparkhi, Anup Bhange (2012). Anomaly Exposure in Network Traffic and its collision: a Survey  . International Journal of Advanced Research in Computer Engineering & Technology(IJARCET), 1(10), 282-286. https://europub.co.uk/articles/-A-104339